General

  • Target

    0f90243c0c0be0cb800410c2fe10e1a01d4c2a5034eed4bf79d3f9fcf1d453e9.exe.compressed

  • Size

    99KB

  • MD5

    4a733d80c2d152adc805d59df397cbec

  • SHA1

    7f8bcd86f27bb8f4a87b0af4d80a2433697fc30d

  • SHA256

    fa1fe32f2dbc2728ee292cee1e352c3d37c345893adfbb051c9c0afddfd8522e

  • SHA512

    ed5ae3f01897b42b3f1acf1d258b36da5a9eefd271c5513d159ab1d02bbacf896ae2003c3765971eeaa2c9c01a21c8fb0e81cefe4dd2c18f77f54ba79c12230e

  • SSDEEP

    3072:qKiJSuICoVLop3pYTGGcBtkowoxxnNycSi7LTl:KguYq2GGEkowCFpZfT

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0f90243c0c0be0cb800410c2fe10e1a01d4c2a5034eed4bf79d3f9fcf1d453e9.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections